CVE-2023-2728: Kubernetes mountable secrets policy bypass
(updated )
Users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using ephemeral containers. The policy ensures pods running with a service account may only reference secrets specified in the service account’s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets
annotation are used together with ephemeral containers.
References
- github.com/advisories/GHSA-cgcv-5272-97pr
- github.com/kubernetes/kubernetes
- github.com/kubernetes/kubernetes/issues/118640
- github.com/kubernetes/kubernetes/pull/118356
- github.com/kubernetes/kubernetes/pull/118471
- github.com/kubernetes/kubernetes/pull/118473
- github.com/kubernetes/kubernetes/pull/118474
- github.com/kubernetes/kubernetes/pull/118512
- groups.google.com/g/kubernetes-security-announce/c/vPWYJ_L84m8
- nvd.nist.gov/vuln/detail/CVE-2023-2728
- security.netapp.com/advisory/ntap-20230803-0004
Detect and mitigate CVE-2023-2728 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →